From a40f1c80b62934bbb49f155f6fc13a15298e0bed Mon Sep 17 00:00:00 2001
From: Jason <38218303+JasonRBeer@users.noreply.github.com>
Date: Wed, 26 Aug 2020 11:08:04 -0500
Subject: [PATCH 01/17] Update troubleshoot-microsoft-defender-antivirus.md
Fix the event viewer path
---
.../troubleshoot-microsoft-defender-antivirus.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md
index 6bc4a4a744..d800c3bebb 100644
--- a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md
+++ b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md
@@ -48,7 +48,7 @@ The table in this section lists the main Microsoft Defender Antivirus event IDs
## To view a Microsoft Defender Antivirus event
1. Open **Event Viewer**.
-2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Microsoft Defender Antivirus**.
+2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender**.
3. Double-click on **Operational**.
4. In the details pane, view the list of individual events to find your event.
5. Click the event to see specific details about an event in the lower pane, under the **General** and **Details** tabs.
From d56c44c45b59d500c9c06031008c442e440ee143 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Thu, 27 Aug 2020 10:56:09 +0500
Subject: [PATCH 02/17] Update onboard-offline-machines.md
---
.../microsoft-defender-atp/onboard-offline-machines.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md b/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md
index ca0ae8b595..22a6d8de5e 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/onboard-offline-machines.md
@@ -54,8 +54,8 @@ For more information about onboarding methods, see the following articles:
## Azure virtual machines
- Configure and enable [Azure Log Analytics workspace](https://docs.microsoft.com/azure/azure-monitor/platform/gateway)
- - Setup Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub:
- - [Azure Log Analytics Agent](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
+ - Setup Azure Log Analytics Gateway (formerly known as OMS Gateway) to act as proxy or hub:
+ - [Azure Log Analytics Gateway](https://docs.microsoft.com/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
- [Install and configure Microsoft Monitoring Agent (MMA)](configure-server-endpoints.md#install-and-configure-microsoft-monitoring-agent-mma-to-report-sensor-data-to-microsoft-defender-atp) point to Microsoft Defender ATP Workspace key & ID
- Offline Azure VMs in the same network of OMS Gateway
- Configure Azure Log Analytics IP as a proxy
From ff24f9d3cf534e3bb09c9d7bbf2cc7de9d9969a4 Mon Sep 17 00:00:00 2001
From: Lovina Saldanha <69782111+Lovina-Saldanha@users.noreply.github.com>
Date: Thu, 27 Aug 2020 12:56:31 +0530
Subject: [PATCH 03/17] Github-PUAnote-update-to-detectandblockPUA-4254702
Corrected the typo... "Be be" appeared twice.
---
...ck-potentially-unwanted-apps-microsoft-defender-antivirus.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
index f996b8c772..70611a2a36 100644
--- a/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+++ b/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
@@ -24,7 +24,7 @@ manager: dansimp
- [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge)
> [!NOTE]
-> Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software which might not be be unexpected or unwanted. By default in Windows 10 (version 2004 and later), Microsoft Defender Antivirus blocks apps that are considered PUA, for Enterprise (E5) devices.
+> Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software which might be unexpected or unwanted. By default in Windows 10 (version 2004 and later), Microsoft Defender Antivirus blocks apps that are considered PUA, for Enterprise (E5) devices.
Potentially unwanted applications (PUA) are not considered viruses, malware, or other types of threats, but they might perform actions on endpoints which adversely affect endpoint performance or use. _PUA_ can also refer to an application that has a poor reputation, as assessed by Microsoft Defender ATP, due to certain kinds of undesirable behavior.
From 8b02094dd0d64344cf86b6274749670a6950243a Mon Sep 17 00:00:00 2001
From: amirsc3 <42802974+amirsc3@users.noreply.github.com>
Date: Thu, 27 Aug 2020 13:59:29 +0300
Subject: [PATCH 04/17] Update configure-proxy-internet.md
Fixed typo
---
.../microsoft-defender-atp/configure-proxy-internet.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
index a25c911a4f..9469ec674f 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet.md
@@ -111,7 +111,7 @@ If a proxy or firewall is blocking all traffic by default and allowing only spec
|[](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx)
[Spreadsheet](https://github.com/MicrosoftDocs/windows-itpro-docs/raw/public/windows/security/threat-protection/microsoft-defender-atp/downloads/mdatp-urls.xlsx) | The spreadsheet provides specific DNS records for service locations, geographic locations, and OS.
-If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed below from HTTPS scanning.
+If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
> [!NOTE]
> settings-win.data.microsoft.com is only needed if you have Windows 10 devices running version 1803 or earlier.
From 1192a1f3ef72057a746103dd6e12bd4e805d4152 Mon Sep 17 00:00:00 2001
From: Shravan Thota <57046359+shthota77@users.noreply.github.com>
Date: Thu, 27 Aug 2020 17:48:30 +0530
Subject: [PATCH 05/17] Update microsoft-defender-atp-android.md
1. Deleted below, to stop users from visiting security center onboarding page. As User can download the page from Google Play directly
If you have preview features turned on in the Microsoft Defender Security Center, you should be able to access the Android onboarding page immediately. If you have not yet opted into previews, we encourage you to turn on preview features in the Microsoft Defender Security Center today.
2. Updated below note to announce that app is now available in Googla Play
**Microsoft Defender ATP for Android is available on Google Play now.**
You can connect to Google Play from Intune directly to deploy app across Device Administrator and Android Enterprise entrollment modes.
---
.../microsoft-defender-atp-android.md | 6 ++----
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md
index e25b6e042f..c824373e81 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android.md
@@ -27,8 +27,6 @@ ms.topic: conceptual
>
> As with any pre-release solution, remember to exercise caution when determining the target population for your deployments.
>
-> If you have preview features turned on in the Microsoft Defender Security Center, you should be able to access the Android onboarding page immediately. If you have not yet opted into previews, we encourage you to [turn on preview features](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/preview) in the Microsoft Defender Security Center today.
-
This topic describes how to install, configure, update, and use Microsoft Defender ATP for Android.
> [!CAUTION]
@@ -86,8 +84,8 @@ For more information, see [Deploy Microsoft Defender ATP for Android with Micros
> [!NOTE]
-> During public preview, instructions to deploy Microsoft Defender ATP for Android on Intune enrolled Android devices are different across Device Administrator and Android Enterprise entrollment modes.
-> **When Microsoft Defender ATP for Android reaches General Availability (GA), the app will be available on Google Play.**
+> **Microsoft Defender ATP for Android is available on Google Play now.**
+You can connect to Google Play from Intune directly to deploy app across Device Administrator and Android Enterprise entrollment modes.
## How to Configure Microsoft Defender ATP for Android
From 2e5b0521c3e181bc2428b2f8ffce3c49e02b4003 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Thu, 27 Aug 2020 19:35:38 +0500
Subject: [PATCH 06/17] Update usmt-scanstate-syntax.md
---
windows/deployment/usmt/usmt-scanstate-syntax.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/usmt/usmt-scanstate-syntax.md b/windows/deployment/usmt/usmt-scanstate-syntax.md
index 2a306d9af5..e84e611650 100644
--- a/windows/deployment/usmt/usmt-scanstate-syntax.md
+++ b/windows/deployment/usmt/usmt-scanstate-syntax.md
@@ -720,7 +720,7 @@ The following table indicates which command-line options are not compatible with
/nocompress |
|
|
-X |
+ |
N/A |
From db3eccfd6ffe95167290b216574939e205cbcc3d Mon Sep 17 00:00:00 2001
From: Shravan Thota <57046359+shthota77@users.noreply.github.com>
Date: Thu, 27 Aug 2020 20:43:41 +0530
Subject: [PATCH 07/17] Update android-intune.md
---
.../microsoft-defender-atp/android-intune.md | 72 ++++++-------------
1 file changed, 23 insertions(+), 49 deletions(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md
index d2f56eeeb1..7497f32376 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/android-intune.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/android-intune.md
@@ -30,56 +30,37 @@ device](https://docs.microsoft.com/mem/intune/user-help/enroll-device-android-co
> [!NOTE]
-> During public preview, instructions to deploy Microsoft Defender ATP for Android on Intune enrolled Android devices are different across Device Administrator and Android Enterprise entrollment modes.
-> **When Microsoft Defender ATP for Android reaches General Availability (GA), the app will be available on Google Play.**
+> **Microsoft Defender ATP for Android is now available on Google Play.**
+You can connect to Google Play from Intune to deploy app across Device Administrator and Android Enterprise entrollment modes. Updates to the app are automatic via Google Play.
## Deploy on Device Administrator enrolled devices
**Deploy Microsoft Defender ATP for Android on Intune Company Portal - Device
Administrator enrolled devices**
-This topic describes how to deploy Microsoft Defender ATP for Android on Intune Company Portal - Device Administrator enrolled devices. Upgrade from the Preview APK to the GA version on Google Play would be supported.
+This topic describes how to deploy Microsoft Defender ATP for Android on Intune Company Portal - Device Administrator enrolled devices.
-### Download the onboarding package
+> [!NOTE]
+> If you have already deployed **Preview APK as "Line of Business (LOB)" app**, you need to redeploy by adding new app as "Android store app"
-Download the onboarding package from Microsoft Defender Security Center.
-1. In [Microsoft Defender Security
-Center](https://securitycenter.microsoft.com), go to **Settings** \> **Machine Management** \> **Onboarding**.
-
-2. In the first drop-down, select **Android** as the Operating system.
-
-3. Select **Download Onboarding package** and save the downloaded .APK file.
-
- 
-
-### Add as Line of Business (LOB) App
-
-The downloaded Microsoft Defender ATP for Android onboarding package. It is a
-.APK file can be deployed to user groups as a Line of Business app during the
-preview from Microsoft Endpoint Manager Admin Center.
+### Add as Android store app
1. In [Microsoft Endpoint Manager admin
center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \>
-**Android Apps** \> **Add \> Line-of-business app** and click **Select**.
+**Android Apps** \> **Add \> Android store app** and click **Select**.
- 
+ 
-2. On the **Add app** page and in the *App Information* section, click **Select
-add package file** and then click the  icon and select the MDATP Universal APK file that was downloaded from the *Download Onboarding package* step.
+2. On the **Add app** page and in the *App Information* section enter **Name, Description**,
+**Publisher** as Microsoft and
+**Appstore URL** as **Microsoft Defender ATP Preview** app Google Play Store URL: https://play.google.com/store/apps/details?id=com.microsoft.scmx
+Other fields are optional and then select **Next**.
- 
+ 
-
-3. Select **OK**.
-
-4. In the *App Information* section that comes up, enter the **Publisher** as
-Microsoft. Other fields are optional and then select **Next**.
-
- 
-
-5. In the *Assignments* section, go to the **Required** section and select **Add
+3. In the *Assignments* section, go to the **Required** section and select **Add
group.** You can then choose the user group(s) that you would like to target
Microsoft Defender ATP for Android app. Click **Select** and then **Next**.
@@ -105,12 +86,6 @@ completed successfully.

-During Public Preview, to **update** Microsoft Defender ATP for Android deployed
-as a Line of Business app, download the latest APK. Following the steps in
-*Download the onboarding package* section and follow instructions on how to [update
-a Line of Business
-App](https://docs.microsoft.com/mem/intune/apps/lob-apps-android#step-5-update-a-line-of-business-app).
-
### Complete onboarding and check status
1. Once Microsoft Defender ATP for Android has been installed on the device, you'll see the app icon.
@@ -120,6 +95,9 @@ App](https://docs.microsoft.com/mem/intune/apps/lob-apps-android#step-5-update-a
2. Tap the Microsoft Defender ATP app icon and follow the on-screen instructions
to complete onboarding the app. The details include end-user acceptance of Android permissions required by Microsoft Defender ATP for Android.
+>[!NOTE]
+>If you already have **preview version of Microsoft Defender ATP app** installed, follow onboarding instruction to replace the existing version of app
+
3. Upon successful onboarding, the device will start showing up on the Devices
list in Microsoft Defender Security Center.
@@ -133,20 +111,16 @@ For more information on the enrollment options supported by Intune, see
[Enrollment
Options](https://docs.microsoft.com/mem/intune/enrollment/android-enroll) .
-As Microsoft Defender ATP for Android is deployed via managed Google Play,
-updates to the app are automatic via Google Play.
-
Currently only Personal devices with Work Profile enrolled are supported for deployment.
>[!NOTE]
->During Public Preview, to access Microsoft Defender ATP in your managed Google Play, contact [atpm@microsoft.com](mailto:atpm@microsoft.com) with the organization ID of your managed Google Play for next steps. This can be found under the **Admin Settings** of [managed Google Play](https://play.google.com/work/).
-> At General Availability (GA), Microsoft Defender ATP for Android will be available as a public app. Upgrades from preview to GA version will be supported.
+> If you have already deployed **Preview version of Microsoft Defender for Android app**, you need to redeploy by adding new app as 'managed Google Play App'
-## Add Microsoft Defender ATP for Android as a managed Google Play app
-After receiving a confirmation e-mail from Microsoft that your managed Google
-Play organization ID has been approved, follow the steps below to add Microsoft
+## Add Microsoft Defender ATP for Android as a Managed Google Play app
+
+Follow the steps below to add Microsoft
Defender ATP app into your managed Google Play.
1. In [Microsoft Endpoint Manager admin
@@ -247,7 +221,7 @@ Defender ATP should be visible in the apps list.
10. Select **Microsoft Defender ATP** app in the list \> **Properties** \>
**Assignments** \> **Edit**.
- 
+ 
11. Assign the app as a *Required* app to a user group. It is automatically installed in the *work profile* during the next sync of
@@ -279,7 +253,7 @@ confirm that Microsoft Defender ATP is available.
3. When the app is installed, open the app and accept the permissions
and then your onboarding should be successful.
- 
+ 
4. At this stage the device is successfully onboarded onto Microsoft Defender
ATP for Android. You can verify this on the [Microsoft Defender Security
From 59fef75b7316ad53f733fc91d0de6a81a374fe50 Mon Sep 17 00:00:00 2001
From: arcarley <52137849+arcarley@users.noreply.github.com>
Date: Thu, 27 Aug 2020 11:04:59 -0700
Subject: [PATCH 08/17] Update waas-wufb-csp-mdm.md
Updating the Target Release Version Information to be correct
---
windows/deployment/update/waas-wufb-csp-mdm.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/update/waas-wufb-csp-mdm.md b/windows/deployment/update/waas-wufb-csp-mdm.md
index fb1ed848ac..4a64bd6c82 100644
--- a/windows/deployment/update/waas-wufb-csp-mdm.md
+++ b/windows/deployment/update/waas-wufb-csp-mdm.md
@@ -102,7 +102,7 @@ Now all devices are paused from updating for 35 days. When the pause is removed,
#### I want to stay on a specific version
-If you need a device to stay on a version beyond the point when deferrals on the next version would elapse or if you need to skip a version (for example, update fall release to fall release) use the **Select the target Feature Update version** setting instead of using the Update/TargetReleaseVersion (or DeployFeatureUpdates in Windows 10, version 1803 and later) setting for feature update deferrals. When you use this policy, specify the version that you want your device(s) to use. If you don't update this before the device reaches end of service, the device will automatically be updated once it is 60 days past end of service for its edition.
+If you need a device to stay on a version beyond the point when deferrals on the next version would elapse or if you need to skip a version (for example, update fall release to fall release) use the [Update/TargetReleaseVersion](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-targetreleaseversion) (or Deploy Feature Updates Preview in Intune) instead of using feature update deferrals. When you use this policy, specify the version that you want your device(s) to move to and/or stay on (ex. "1909"). Version information can be found on the [Windows 10 Release Information Page](https://docs.microsoft.com/en-us/windows/release-information/).
### Manage how users experience updates
From 5b5524a7ae4d3e12597fbb11fd19d8f8aedd10b6 Mon Sep 17 00:00:00 2001
From: Jaime Ondrusek
Date: Thu, 27 Aug 2020 11:15:24 -0700
Subject: [PATCH 09/17] Update waas-wufb-csp-mdm.md
Small edits.
---
windows/deployment/update/waas-wufb-csp-mdm.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/update/waas-wufb-csp-mdm.md b/windows/deployment/update/waas-wufb-csp-mdm.md
index 4a64bd6c82..0f9d18a924 100644
--- a/windows/deployment/update/waas-wufb-csp-mdm.md
+++ b/windows/deployment/update/waas-wufb-csp-mdm.md
@@ -102,7 +102,7 @@ Now all devices are paused from updating for 35 days. When the pause is removed,
#### I want to stay on a specific version
-If you need a device to stay on a version beyond the point when deferrals on the next version would elapse or if you need to skip a version (for example, update fall release to fall release) use the [Update/TargetReleaseVersion](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-update#update-targetreleaseversion) (or Deploy Feature Updates Preview in Intune) instead of using feature update deferrals. When you use this policy, specify the version that you want your device(s) to move to and/or stay on (ex. "1909"). Version information can be found on the [Windows 10 Release Information Page](https://docs.microsoft.com/en-us/windows/release-information/).
+If you need a device to stay on a version beyond the point when deferrals on the next version would elapse or if you need to skip a version (for example, update fall release to fall release) use the [Update/TargetReleaseVersion](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-targetreleaseversion) (or Deploy Feature Updates Preview in Intune) instead of using feature update deferrals. When you use this policy, specify the version that you want your device(s) to move to or stay on (for example, "1909"). You can find version information at the [Windows 10 Release Information Page](https://docs.microsoft.com/windows/release-information/).
### Manage how users experience updates
From 1288028449960760e465e6619528fab7f27843d7 Mon Sep 17 00:00:00 2001
From: Daniel Simpson
Date: Thu, 27 Aug 2020 11:39:52 -0700
Subject: [PATCH 10/17] Add files via upload
adding screenshots
---
.../images/mda-addandroidstoreapp.png | Bin 0 -> 62168 bytes
.../images/mda-addappinfo.png | Bin 0 -> 78284 bytes
.../images/mda-devicesafe.png | Bin 0 -> 36240 bytes
.../images/mda-properties.png | Bin 0 -> 87721 bytes
4 files changed, 0 insertions(+), 0 deletions(-)
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mda-addandroidstoreapp.png
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mda-addappinfo.png
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mda-devicesafe.png
create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mda-properties.png
diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mda-addandroidstoreapp.png b/windows/security/threat-protection/microsoft-defender-atp/images/mda-addandroidstoreapp.png
new file mode 100644
index 0000000000000000000000000000000000000000..898b158eb28c9fb8ab692048d8049f2cf680a1b6
GIT binary patch
literal 62168
zcmZs?WmH>H*9I8e-QBIYTXA;?P^3t3C{Wzp-6>A-0)^u4?!^klT}yFy=JuV>)|xp#
z2!Z4zH#u7#*-`4Ma%jlJ$RH31O+j873jBoFu4flJpO7
z2i8hLMFIq>O+a}zfdlR%Im+v~fIw8hv#9u?xOMZqL7+=}1!)N_Pov{bI9<}w_1n&k
zC!;g7gIbqK@87&69v&Wdu+*3yEV7~Ejtm0QjuD&KtGSz}r!d^8lO9uA+?gOOJO1|a
zr#9~L?^VD${qy=}otYp&s)~a5zia-93Uf^Eerl#S=nQYDEJs0N
z>4!SHm_$0GTDz$HeMphiq2M3*?@6MV?8bG7bQ#jb46<+hCI%m>aZ`JOMcIwVKC&HE
ze|$;C>Q9n|-{)^bV#OK=TTd57)EGCeDk`xm
zadE{Zw3yfZk!zeq#RGU~ZjJUI`KYo8CW2)uD#{g=j0_un|D5KoXlti(Rwr+V0NcQD
zaL{BLDri8VB`@hz8~E>Jp{ALd+F9F~N0#J&%O@FlrmNEB31D09pz%TZVWP*_>iv*h
z70;J>F?sUQ8o9#X__Qjhi=64b&m*qWeMuhlYl2n?DF4Du-}UFooMBzpKc7
zVF>^CkQ|9sq_bo>oU14Fn>eg>T%c|7ZaXTYp`f`rxx+4^W+--iMmx)jEg4MN-lpc)
zA$W=K{*Z=W&Tcd?ICQ+!2y^i=JBSh-68!l1nEC~efIUZTUsCe)lnggKEPNu1^XKXW
z4?F+D)Iw=_Inr_HUg6J^kNl;@wCU+z;9&2E2c#)hy9roQQ*sTBjR^<{VifYx8^kt~
zp@mRIp+>c|Kk)JJK;WQodJ+!H82Pfv2*$H7{-g|#r?E)$;>T!%!OHqDZ4;TiJGVbb
z4)GrIGBPkpNNBuwr-NJTYbhs4a0w&frGi6dD81#`21CQc^IyYUtkT&HX;Et{0NM
zKN(_-c@;VEOvVEBh6W;g!aMTJQRCDxB*W
zP+$X4C|t}`(pdFi;d_Ed>V_Oj)<0Ep)i<-`B*dHKV0|o7V$2kEOK$s)-1h<;u?tzt
znP(t~3Q46x?V+kLzuIm+3(C_3X-o0;YBhwHKo}YtYpW_N7rQ<9`L^TjKTh|gsgU?~
zbaHWX^MBTDw(d1>U{?#hWCw%geKE{*vA1_L4*%}Nv5_q{Bb-cSiE4wlk&&lz1w}k=
zQ8DhU1_uX8epl;pIG`^Z44J(E`;{)`1zMgM4
z$g-@}YGD!|U+JTg%jJMETaIwZse+P1ph8Xl--Y7V)u!LSe_vUtb;ob7f1(__&23jx
zV*c9sO__2x757Y2UscKQEvl>aM9PIk`(-%!j;EKk^dTkkA>Y}pU!R;ENxvvnQsqBO
zq)T=;=uq*a5)BW}z|;Z*$GMj^BCc|*>*f^*$BahW(ku$+MGdi1w+Z%wXuHM6(*k4FB&jSoBG+vRtTZ2-596wDoLy%G>z|FyxpeDF<&pfTAtln
z2bPmyTR}xpoXFVP8XBs)hDLmEQj7P}>~{IrD)g}*EG+JyH$GW@ise~^SwY+q{w-;!
z0_W74R1g&2cC<5`z;Say;}QtfvX|PT>!Qisw6+!UR9{!uLk{=w@cQb%=pv4*uTM-F
z4GQRf?&uf_hi4kCct59CC$9)Dtg32iXn<|!?1j%CsU-S!INy?{56ZJT2ib8WH-5{zQ#_CK8eM1@1u?kkLxoV*muF5
zHn@VVgdew;6z^bXS&2eC96)pLZ%WY@3xg~se)W1^>$%lV(H?N{67jEydQZf;Fi7To
z`$iuc!t#N8TT&_{B4I)$3TuObjvk+YplDe)x7{ggC<-2n9QuQ}1|hp@qoDI4NL3u>
zQ~Ye?0d1AR@d1kgr9Q+(b92OjPn&KG0?)~
zPZ~Zx@zJLrtgP-$d@hzM%}sUYE{pq?^pOiBBqZ;cnX#V!Sliy*+&nxz1j*KPe@Rb|
zfJLBMo0$pvI+e>y!^+Cb!h+k7nDz+Gt6}}wa{1S<5D}Nhxl!wP^z`s2ySuxfDa@{r
z>EsmbUeeE1Rq{Zd;H4EHdw
z{kj_AE!5c97z*Z~Y;6_P{_^GF;o%T|S+42;IX!OW^^(!kJE5{
zG0$^MnaiqgjYaKKSD5P25e}5Gp&sIqarFmoaBC^am%(FJ=BcVm%yw&SetrQB@0}HU
z$wM-Hww_yS&L^W`>xxNt5Gg<;r;FjCkaZ_6J)XdutOi_=$JNk{6#21wTmJ-iQ-*a5
z#+p+~|6_3nPYtqvJ<5&GXY8AACEq4Y{-uWo}*z%M-1OJz&77
z)0D_GAvF~@H2mz18a_E3Of5ySE~pot1<}y*HD9?5m*P_t*w=b#=<$l18US3JRm#
z{5k{ei0N3R)IoR#V%F3Dl3&kZy;3143SS2-@jw}Q~EYH*4|#+%94>VS4<}+0+neS
zC+TILIeods9^vjx#1%r3{ZrIq-__cYBOj}%+2!fOL>M2`x{=Y>O=NXN2L}f`<%z*7
zt6rb{qNlslD!s<%%Rv-I4d49f)wxhZ>x(`w2wtMBw5Px{94pSfL7R0@AQe8qi8Z^*pbfDHl;+{)X2Lq1(jS2i!O~$j9uP&smSW)iBFFS>
z^;qjvd(a{vETZ0$(7P3PUPVUOxg#etld=V$_IIIjwatRLW;Yh~s`7nnV&UiW)I=l+
zT&Ob72ZX;Fy1AX-B88yU1%0G$Y8K%x{W&~$Q~NO5?=lHVdKuy=1{Xq7X`G%j7?EpZ
z%-DNxZEbDG<<!H#<
zKfyV#zY8Q~(PPhkf7fRRCulU!OzrMb4kk@Yk$lO|+hX2_3Qd2k3_JfCv`#MQ8W_tB
z|G_h7FrGrHpdd&z`2K=?rIssz(eq9M=<_IF_Bn^uHwlAwR81tHy3}Esb~2vavIGB<
zQF(@<)Nc3V>gwulZ{4MJ5Ye!HvKw}Yt3x3e!Kxv4ZFn1b$`vJPkEe%6ge@&CvE=Y0
z5_{euLj5Z`DTjf2vXJZBM_!_w2&|tB^z@XDa*GH&eMCgH)%7Vjl2ULFPe7x-
zK{w=CF#|oRK`8>u3W5hm;^3#n2;3CkM{&011P4jVug%T5Dn1V!XZ~{1r)7}#HD#?a
zz*O?}%}Ge$m(}(hy5Q#fT}8GM0u2)r6KzynoSOb63`m@^2Mvv6c!I%=vhv@mzJqmi
zVpyRCSeRJ{GgvZ&S0)CE3kywuh2JcaLIgpy?+_X3cyGeu;_xtT@mU?6UFFr(U`im^
zAgSw-t+6p=)cYL0Ur=p851{;bb5J}0%N$c02v%3*NMPJIGxok5A^q12hhcK^(G#Zz
zLk*z!yqVqG9owwBR{^-<7sH^iurLxf11{TTTWeLjK+M0F1685^iG$U;N($X>{^N9_^*3U^{2?JJ2W0B;4MJ%}bjwx9&p#2RKMSv5P
z^ByU{B-~&pJ$1_JjiwP^f5LFUiOlPvPxN-fQP%`k!jJ$8`D*vn`g&DihwoHXu7W}o
z3?p2rgS5PbMM-4Yx-W2)cb=VJS2JU;T|-^_#JL%?R|yw90>m5n_C}D)WAWluAP9CC4({POoj&gNH#-Zue?BF(*+3g-Q5^Css=nkU&NUH^45li(6`u|Gb|sqo8ol{<=@tIPY8NO%2BDJwEIQ;B=4Jb3}d`r73OL
z>D1S~g9EC_zGKE-p+bKzuccoM2~ZHS+}wl7uV48dn%9Jz7Zw)u^mHK<{^Xk!_{7PW
z6c~!Vr>^@A0^%s+eZPnKBacty^I?&Ekpq6*@1NuhPmUsXFQBA4zqZZN*d7!x4YH5?
z9@Kp7YHAr!QVg2uJN1hg*-K5*MCR+CA5WK0oigR!0fmZ?tT$VENJ+uep#DX|99A^#
z*q_Rj*{AMTRQ^DMWJh}`m=C=#1LsKl2^qQ8AQi$gGK7h1YIJNAf9rlYRf2LrukuU;
z8*7NE=lc_XGF!?Mm%FeouNq^l+BjvY)gHw={v_0yB|eeSCS^4xqIHBXyj0}@t)18s
zz$XX;l4#`y@6w&^Zh&*0#yc4PA?^wuCyp|X7uywkep)K_
z-K{4Wx`>xcAh>sU6sA*>tRYaLxPPFGMpteNO)gfUj|4?l#WLzybkjC=-P8~|4*~I!
zw}vtUl?54YC3WJmO(l?QXm*?F@!P#Pc{Yd}
zxf(_9=PT7-Cmt-)tmuClAd*-ZUey3_vJU3k7GZ)WH)B|iY}CO-R!|~=m9BKkE(>>l
z*cP#z8yfF?evkNoRo|X2W8oqwAb>@y#TRxcO8azuEjHFQr&wOz`>0q~(b-u%kit~m
zp7kf()&3?6_eDB|lVvZHL!~N_bxMwI(hx)4)9tCOy3g)36!uK~kbvM<5tn!T{0KI7
zksYfB`7~*gs*jfR^qrlZKr4_d>c&;*j)3qq)4$$M7{kZMW#{0K-W{MOr-UQ%5R+<-
zD=Q~AKmU6@y}c9wdFuGJjIuC38fGx;t8%+h_auAyxYOnJDKv$?TH=W4Bf1<8?nXvc
z71=0!q`&*df5C7>t^MPCfM)t`@AP!B39cT(n?NdLZE6P_izV!jYZfe2TgzF?ITIKM
z&;+$hc5`wDL9(;6U^CM~fNk13*+V+&^80J)sE#SQ4dm0>7OT%yhahiT2djl48yqpG
z=i_~_>=s6T;gPv1cgZ{+YFLY
zlBswUWfkRf3ky$=o@TOiGH}MmdBSzgEUaHC1?2FByF)s2zm&jvL;HUEWCvSF=^Ygl
z$I8n3rPB*0Y9bajRH!WKrf=c=UIWX{^s@PEBG#3eS;@{1ln~S_B|XS)RJ^#fd@f5#
zzdW@-;1dH$H|n;W-~XAdYScL#&=k6bw!UUOi!s5HYvjQ?*!P;bTd@F!sE_p)l@5o4
zYq%Dx5RU`bI?}gUGfGQ~;_NgusGzMYS;aYM1rVhY4smFFPA6>a0#j3WLqqRl4yFnu
zJ#`5|oRmEq0A{c+gq9_O3Ca~$(S|dN&{%BrWA56`K-t^W=Ly^DPm7O@1#QA3z$q#i
zWb#|l)ARDorIZK@3we8aH8nL+XXk#gur!U;~Pz8Jk9Osz92aglRlV12)wzm?ReZJ
z3}RO>HH8+66^xIH-mHo2m($fPdzCWurQn&H<6w`Ufn2mK68heKVEY)X_vw4ZjDUMC
zC_v0t#8G`Sfja^G_~?Cg<+W4!qaL9s#f8&7v=|?Me^=1t=0_9r{Difgpl3f)+rlF1i(D*0=SVS@+Cx4*eB#^NTW4oi
z@jDK5T}DRqqUaZdjn3Sa=0b})sXlqLX`Z=xQ!~?=PokphgtFHZMOZjwxsTLv^~cM#
zXd~aheUJTydpe$^5?F-fjsZY;Af-I3s0XXmn7rtd(%acpI_b-VINzN@5FEgz|{iDy1sNz84x4+|nI-W!C_^#XMfUl5(^uWn;I0|p*fnZph)cI^Z
ziOjDduAf&`NFW)bF!cdoUxTLdih?P7h%=qm2S)j+M9D9hRkcTUit`IA8?1X*0g$j6
z>$QKakduYQvK<;$MsO2mMbXI_XpJ*INHn&-j&947--p=YIs=_U5fTzIP22?C_YU^Z
zcH#Whx6An<*>)CORmB!aEzQdXPBtkhsL+XD>gRCaz>nvE@sW3SPEKfUjzbH!LOIrG
zcej&sOis=TMT;wg-=c$u4GK+2U)YcPTgw*7hN#2lF@
zE@g;!LfHe-77|)EY%hAl`O#DsN-7Dlcd0=(1%*b0_@uiSY+-_p}L3{oZf*sAy0QQp%FCu(xFjnc!okP
z0qljwHVR0g-+&aqvu)aoNBD@RM6l87hk`{Q6aq(;EO8jtg8rj`+nVU=^0Xv2M&>Z=
z1rrM>ii==FZMb%7WUOwe=xH3T_UZ(TeLr%{zzj5I$swW?Oib$J_w?SdWU>boM}G=Q
zsW@+uk3o_5HJ=FC)I2<3qs!PAA3GwzP4)*SvTssM9E@!tCw~tS2f6thkq=>s$Wn{2qWPfGLs8rvF9%7>%08|xadV!E
zo0u0-)6D+*wR^fw#d>{xO9|v!poev1GmcECc*o57=Yod&m=lpR34REo+u7MsgOEW;
zR0x0vXwJ_*!p-gNO5p7=`=#u#urS79{ts$$!vh0|i_t95rlj;E)_sS9`VxZMw#SE?
zed7e|o0u?T(k2rAqK?o==n;O0oBnnTmFRVg6NtX;Z9+*y1b7wUu!Z)O?ByFvGfw-s
zXI=48p=FHpj|~2bdIQ
z5nBn|1*xLPn0tGB04`h1t6>HttpcgV2o5CNATnIDjEqFksazRaEc`W1_>dMOjR@KX
zGA-!P`t~?ela(cnA+Jq6l8;kBP9}kepO=b+h)7`s2f8G%`snZ9tn6$jw(^P!xO*ya
zx0fNjW^Y-(V*?H3T@D87_01<++v$&WkBcJv6FKpkShMr<+FM&D03T;L5M;KVqX&AI
zx-h3DCnrPIYi|p11F)O(3s=^fhH(+)WMpI+Si^ps2*`q@=(iMsjI)!f@ry(w=t%Ly
z=Izjfd4T&Q4hp&$EM90y819)AXvyE>=IqF4Wz0^di3S`FF=9Ir
z!)!lLNpG*=2VqmfVwc69Cc(ageC$xZdLxeE*&p;}q@ohW=D;2?eHZ(~ed}2-ly1=w
zYZMZ?1>jG4o`f;^M0CoS){)qbOA94=vRMTdbU*wFx(?)f=~1BqY}#oQTxum^x%9-L
z4s-Wc?~5il2iaG9nhaz!r2-3FQwz8sy^P{ik9;i**3q#f$eaX?7@~G<1DF
znU<6lES-ElLq_g|WUSL#lOMuc>w}KJ!|zWXfemm)>}I(Do_x}j+dA8^yH1ZTuokA
zmvl`kS+^y%V5ChEYd)G=SWtJ!R*LxyHT=lt2cUoL(s4h6mj;)q=J{deA5G3PfMK6O
z-=0$;S@@a7dGg%K9qBEB_3N8*pA!_CqCx9>v*q0-?oucPPMd=!){GcCcvOCG^i5e_
zNomAjH@Ak`pN@=B(zyceu1C8Y28OvB5=t&weN=XuOKBUyI
zVr1W_bwf#mla*`T`&FtdOnZ-UG$FU)$Rmxv;{w?rrv*81m#Wc)T&e3EG#dw`r6r3K
zD?g7XY{0B0b$J}{$-}=KQ&@$A9W#6`@3F8UkAS2?Q&2{!#<4TNseww5NjgL@x)5>K
zfs8)A()@X7nd)?-&IX2&6R5p=+or>{b%auctRe2|k*7%onwlE27|oy85vh-?9pqBg
z*eD9}QUad7#18Gq?dz}^N<&M$ztxE?g%Avzfa>!t?7U-<_%yxsk4|%id-%l1PC9C{
zpvikW2$Ah@CH20KDH2APJ~yHu`--|OhFuIu;
z6jm);a5WB5S<9ks>ZW>(AL>2qH9&AnVbltCy!Tppx#!eycFB!z!cSwS8_h;xs5cIH
z?46i{{nOrT5%Bo>5mjI|9R6{U6d)1c!iI(hK}s#Fd^vJX{)4ZS&ujk?(aC28k{wp+
zkRpEd_4NVYJRJkW=vsR_WS#Uxx_wN2bzn-7Af_K@kSOJzYV}h%}LsnC-U1
ze5sK6Fy@Z=!+GIbckw7k_Yr*9p}FR!p)27#a~`9qQrz{hRGsRQNTsn5snasTMIj$3
zt&Zmqle0jG6^1b#8MhG}l2>Bv`5vx%^hi0gnJg3hBL)EfVnTtIJ*FOK`xQVDJJ})F
zP$iom8@zVB*_uT}M9_GG9r$A%&VK$~P)DQMS=HlqL^R{&KR7tp%8u=X(tLUG<-93g
zL|S*4uF;hT^pWUX0ebgm##y$>NlFCY0FLQ-?e_&rRc!CuTKxXfr`4G*Z4V5<)`T8n
zt@j%huaw1p+Kp#tQb4-?G*v}*4{vH*`J)_)fJy`)O)jmTgqs}z^7;IeqJc~Rke`2)
zR)ie85!od5BP8`;VeZ{?nPH8Hy0}R7#K8*1V&bDv8_KY#9^oiDx$V1Q7YD&byfU8YKZEpu98X)%%2yn^S9L##kWZ+(3wl#0qqT$mV@@V>>2jH=VBwRU$%B|d8g
z2{}Hz>3dg50Kk0{19i>b&d$6xYX%zr;mCqK7U0?n^?KvuVbLK1JtiN|jlf19!tn$1
zcO`HuX(sUragqn8gTRiA()zn21wax>DbUo`fL2Z1>eD)AU}q}n?(10Mu5ISw;mJ1;
zXF7}uZ+rKSky%81{JG#GsuA==Lu2E`(}p8=_cX$9P+YWk`!j8s{m{|$MA0_$_
zrk5L&>qAFv0o0%4W0vFD#k`%Jotl|Z=l}RhHtcdjFuQg-rkCc!MyTlN^^H!~p9Sli
z?UvOI4ecGQggtI!Uwk~8Yjh(S9W5z1o)BXR#WfAl4h%?lu{024>qEk`J_U-Mt%{5>
z+AnQ~0hrao((?S2#FzuaG5D8|INXJrxioAIZ0Y+PCi>S)oJoPHRfCxlDAw2^0nI!i
zrVr}sfjABFI7)MA
z>8kRAc+a+P-}aC2)}66@VMz9WX11EGd_a%LP0x!EcL$Z^!$~i0V)o{B*1AHKkm3k(
z*DTLc{3WkLMs|#GDWRGHW;1@D0GBJu6y8u>jlmceIwIh1Cfhrs
zDb7ScBMMdPDGi=z!
z#RVaAB|Q<2Giz8uYCl5lCjl4AxTHL8Tlg}hKlwd9y{U!e1xL;>$Zn>h*m%_Jn+?g;0ZJOdEeN+$|K
z$^~1!=LD6~=D0ZR<2^UJ
zD#yCC1$P)oN%I4rd>xA~BUn1GQ9s8}
z5Ce*Qe{}m3w?b5fH5zVEaKP0Cp$|+U=)MPa|Fq
zm_E&E4tT7g;1O+NA0J^ddle}dKS1pf2%TS;*Vg`ktvEBgyLRGYe9G1;KRc}+aCS-t
z_>)M{5taZi2|$=F&d*075}pUnGchyEJPe{70IrJPb91ozQXGCSS;|ftSVF!49G{be
zyF_@hs_Iy2z`QY)uu{D^O_CZB1<(=qt8KiWUx$Um+JMFvQt?`RYl^*uiJ#w8zsf^9
z{nJzgf)lMEKuFPdv=1t)#Lh&_CSw=Zej*g2<@gW^9{D9usv5oZer9Hd%IOAK9=-yU
z3?*IApOFQS6^z@j6KHFn?d_pZ%gPyxNEtAk*0n3mdJ2GIoO}QtsUU}KhehulPPnKd
zvoJ5-8IUrP&rSN;Wz#Qo*@5t3Yv{(-tF=`g;k>#eH2jkMPcLN%nCHP95ueT>Q(TBv
z05$}WH32#gR(vnNz>;{x=4SqI!h~^$JYaM2Qbzy5
zoX$$MK%}Uo^b4#BDEN-_it>@e&h>R%D3@1GV;?j=NOEvMhPH?gK2*XLQs%S<8fEiU
z%4G}q?SzJ=#MIa0sGj~KaK318LDn^hYoR2u0BI@5Yd8@Mfne}SYnttFYG6sTEbC`6
zF^!g&vjdhWN9WZpdz8rnC#TvjQBm$-3qx-446L`VmZxNkJ38TeAdEJs>A7Zf@S*iseksqsZ!|1MEdbP@#N%C7D_ia*#NRJ8SwZ0w9<1tW27D#^N#
zzTn{rR6|O^zWITYyxJDA3_}RQFz8u*8~Ddil+mj>q%4Rea8ZCz1?X}y9ez-`!^i9E
zMgV>XI!(z(puQZ!9HQ7zI5^~JiOZSeK+<))KgZ3&ggrhA*~v}BV8H|x@oLeZiD6X=
z{73%CjuSvaFz->&*Z%|tQzQ8%r6r~HWooGDFbD}L%IZ5`?}B#B8!Uc>1AW=fM3?=z
z<(<`MAf2Y+t2vGJk79>C-5&QTz|O-@2pBl*isb_66qhNgA}DAI(2!J4Pji!#O?3zk
zY&7ZrSldu9_GrPv!&v%G#RZ}j7;0+bd;t7!L;?~;nAw((a|(dBLM1Yxf7IhjcAeb^
zaZ2XpiNuGpkkXF0hSRj({-YPWQQvEm+b>!3i#VDBc2gVJP;;LGOg&Eu=q$1oh%Z^9
zj8=$328szsCdw1v^6(v;TcUVs%clphuM1|RX+e*fb3$@Yerj&}U0#}okcZ0X>hjXl
z1G57Kd>lwdo)~F5rZjI_>kXpA{D
z%|r#Wlsd+(hZchLdu!7lbx?I8xUo;jOaSu3u5L^Cpami--u5g0OVjWOEnHDfg6MdqNgV&(2(ds8G(uqJnWyr<7&T&1P4tg2T
z#kcHXh()$WMv)A&|Hx0%X}V+zU{;7$GrHspGi+~vJ)ZC1~f$R5V`nLs|*oo
z&LHZ;gqTPaR}@1p@1~z&vt(tUisDQEM(3?HdN#D6xTTl~E-7*xQ3;Gar|-e8J!x`S
z3H~